2022
DOI: 10.1016/j.cose.2022.102755
|View full text |Cite
|
Sign up to set email alerts
|

Towards a privacy protection-capable noise fingerprinting for numerically aggregated data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…• We evaluate the proposed mechanism using two reallife databases. Experiment results show that our mechanism (i) provides higher fingerprint robustness than a state-of-the-art database fingerprinting mechanism [35], and (ii) achieves higher database utility than the two-step methods (i.e., either local DP-based perturbation, data synthesis under central DP, or k-anonymity followed [35]) and the one-step approach (i.e., Gaussian noise-based fingerprinting [20]) by considering specific applications.…”
Section: Introductionmentioning
confidence: 97%
See 3 more Smart Citations
“…• We evaluate the proposed mechanism using two reallife databases. Experiment results show that our mechanism (i) provides higher fingerprint robustness than a state-of-the-art database fingerprinting mechanism [35], and (ii) achieves higher database utility than the two-step methods (i.e., either local DP-based perturbation, data synthesis under central DP, or k-anonymity followed [35]) and the one-step approach (i.e., Gaussian noise-based fingerprinting [20]) by considering specific applications.…”
Section: Introductionmentioning
confidence: 97%
“…As a result, they end up changing a large amount of entries in the database and they significantly compromise the utility of the shared database (corroborated in Section VII). The only work that attempts to integrate privacy protection and fingerprinting is proposed in [20]. However, [20] injects continuous-valued Gaussian noise to the data, considers various combinations of variances as fingerprints, and relies on learning algorithms to fit the Gaussian noises.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The digital revolution and peer-to-peer networks have significantly influenced our daily lives, particularly digital information piracy [9]. Consumers may now access digital content and services at any time and from any location.…”
Section: Introductionmentioning
confidence: 99%